CVE-2026-35616

Fortinet · FortiClientEMS

Fortinet FortiClientEMS versions 7.4.5 and 7.4.6 contain an improper access control vulnerability. Unauthenticated attackers can execute unauthorized code or commands via crafted requests.

Executive summary

Fortinet FortiClientEMS is vulnerable to unauthenticated remote command execution due to improper access controls, posing a critical risk to endpoint management infrastructure.

Vulnerability

This vulnerability involves improper access control within the FortiClientEMS management server. An unauthenticated attacker can send specially crafted network requests to the server to execute unauthorized code or OS commands.

Business impact

Compromise of a FortiClientEMS server is a tier-0 security event, as it allows an attacker to potentially control all connected endpoints. The CVSS score of 9.8 reflects the extreme severity of unauthenticated code execution on a central security management platform. This could lead to enterprise-wide ransomware or data exfiltration.

Remediation

Immediate Action: Update Fortinet FortiClientEMS to the latest patched version (refer to the vendor advisory for specific build numbers) immediately.

Proactive Monitoring: Monitor FortiClientEMS logs for anomalous requests and check for unauthorized administrative accounts or changes in endpoint policies.

Compensating Controls: Restrict access to the FortiClientEMS management ports to trusted administrative IP addresses using a hardware firewall.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Because FortiClientEMS manages the security posture of all corporate endpoints, this vulnerability represents a critical path for attackers to achieve total environment compromise. Apply the vendor-provided updates immediately and perform a retrospective log analysis to ensure the system has not already been compromised.